Security Specifics:

Security Needs - This is happening to me, it can and will happen to anybody and everybody. It's your exposure and mine.

ELECTRONICS - Existence, development and use of the electronic harassment devices described in Defend-Dissent.com and ResearchRat.com must be EXPOSED and ENDED IMMEDIATELY. We will NOT have freedom, democracy or free elections if development and use of these electronic devices continues protected and undetected. Remove these devices from my home and vehicle.

TELEPHONE & INTERNET COMMUNICATIONS DISRUPTIONS - Interception, redirection and spoofing of internet and telephone communications must be EXPOSED an ENDED IMMEDIATELY. Sound-A-Like callers with spoofed calling ids are used to disrupt relationships and deliberately disinform targeted individuals. Stop the interception, disruption, filtering and redirection of my inbound and outbound telephone and email communications.

Cutting communications is the first step in a military action. Land line and cellular telephone switches are easily hacked, calls intercepted and redirected to covert remote call centers. Email and internet spoofs and redirects are well known criminal practice.

Compromised communications systems are major threats to our freedom, democracy and free elections.

DISRUPTION & INTERFERENCE with Business & Personal life - Actors appear to deliver threats, disinform business prospects, create problems in business and personal relationships. Neighbors, acquaintances and business contacts are also recruited to assist with these activities. End the dirty tricks, intentional disruptions and deliberate poisoning of my business and personal relationships.

The perpetrators are able to get law enforcement agencies to ignore, overlook and disparage the incidents. Who has the power to do this with impunity? Corrupt Clandestine Government Contractors? Bush insiders? The CIA / NSA?

Stephen P. Kyne, the Park Avenue maritime attorney who engineered the theft of my parents estate told me in 1990 that I was "powerless to stop what was happening." These crimes have an interstate span. Is his job a cover for organized crime affiliations or clandestine government work?

Ronald Lindsey - the indigent computer technician who was paid to threaten me said my "house would become uninhabitable" and "my business and personal life would be slowly strangled" and that "in a digital world, anything can be hacked."

Ronald's photo has figured prominently on the my church's web site. Church had been the center of my life. It was used as a convenient cover to enable illegal, unethical research or criminal activity. If I speak openly and truthfully about what has happened, I will appear crazy and be discredited. This is exactly what I was told they wanted to achieve by a fellow church member, Stephen Douglas.

Charging mental instability is a classic CIA / NSA tactic to discredit their whistle blowers and critics. My experience sounds strikingly similar to stories about government insiders using CIA resources to steal patents and business assets.

Stephen P. Kyne's maritime relationships with big oil companies provide the associations to get me selected as a test subject forBlack Budget research to keep me from fighting the theft of my parents estate. The evidence points in this direction.

On a broader scale, a system that covertly 1) Disables Dissenters, 2) Corrupts Telephone & Internet Communications combined with 3) Media Control could be the foundation and formula for a covert neo-conservative coup.

Is the Bush Administration and their supporters capable of this? That's for you to decide.

Questions? More to come...

Corrupt government contractors? Organized crime? The bottom line is I was targeted for government funded research to cover up the theft of my parent's estate.

I need to be compensated for my losses, pain and suffering.

I am very good at what I do, but I have not come this far alone. I have been blessed with some inside help that has provided warnings and guidance at key times. The perpetrators know this.